Extend installation security defaults with new production-ready providers. Because you are also configuring server logs to capture detailed security events, you will be able to validate these changes later in this task flow before finalizing the server security setup.